As you may know I've been advising on managing electronic records & content management systems for many years. Even with good technology, if a process for sharing & implementing collaborative content is not in place, you run a 60-80%...
Barack Obama’s is dividing opinions, as others have before
As the volume of data continues to grow within our corporate data environments, it becomes increasingly more complex to navigate, locate and contain content in common data silos such as email, file shares, digital archives, cloud storage and other...
Check out this free on-demand webinar provided by Access and ARMA International. This webinar is pre-recorded and free to registrants. Start here.
From the IAPP: The IAPP created an infographic outlining the 10 most-impactful provisions of the California Privacy Rights Act ballot initiative. The infographic gives a snapshot of the potential implications stemming from the CPRA being passed and entering into force...
Professor Daniel Solove provides a great update on facial recognition technology in his latest blog post.
This news is not new news to those who attend hacker cons, but it is important for car makers and auto suppliers to take cyber security seriously. Check out the article here or at the source.
Jeff Hancock likes to give his Stanford University students weekend assignments that let them experience concepts discussed in class for themselves. Before 2008, he would sometimes challenge his students to stay off the internet for 48 hours and then discuss...
Rejected FOIA requests, drone usage by the SDPD, pension awards, and information from SDSU are all highlighted in this article.
Sponsored by Thu, Oct 31, 2019 1:00 PM - 2:00 PM EDT Presented by Richard Medina, Principal Consultant, DocuLabs and Ian Robert Moran, VP Business Development, Access Corp. Today enterprises must take a proactive approach to modernize their RIM and information...
Articles related to this news can be found here: IAPP Denver Post Fortune
Policies and Procedures, Tools and Tips, can all be found here regarding Work From Home (WFH).
Check out this issue in the new ISSUU application. Much easier to read. https://bit.ly/33o2kpN
The effect of the word permanent “is rarely pure and never simple” when it comes to records management. In the post-GDPR world, how you interpret and implement the word “permanent” into your retention schedule—as either a long-term retention period or a...
Become a Certified CompTIA Professional & Solve Basic to Expert-Level IT Issues with 200+ Hours of Video-Led Training
Information Security In an Insecure World Wednesday, April 22, 2020, 8:15-4:45 Grant Thornton LLP, 1000 Wilson Boulevard, 15th Floor, Arlington, VA 22209 Jointly presented by the Northern Virginia and Metropolitan Maryland chapters of ARMA The importance of information security has been steadily rising...
A large manufacturer of consumer products invests in new technology to record, store and analyze customer service calls. A key feature of the technology is that it uses machine learning and other forms of artificial intelligence to help the company track features of its communications with its customers and improve the customer service system. After a few years of operation, the company collects tens of thousands of hours of audio data. The company is sued regarding its consumer practices, and the plaintiffs issue document requests seeking all communications between the company and its customers regarding certain products. The general counsel seeks advice on the company’s obligations to produce the stored audio data and how best to review the data to identify responsive communications while limiting the costs.
“About seven or eight years ago, I came to the conclusion that I couldn’t support it anymore. And I couldn’t support it anymore because I knew that not only had I never seen one record in a production environment enter into a DOD-certified repository, I’ve never even seen any of those applications successfully deployed. So they’re empty.”
Last week, i-SIGMA conducted a follow-up survey to continue to track how COVID-19 is impacting businesses within the IG industry. The results are now in and you can view how the findings compare to our survey results from last month.
Sign up for this free webinar here on the govtech.com website.
A great guide on how to protect children from dangerous content on the web. Click here
China stands alone in the world in the way it engages in broad-based, pervasive industrial espionage through the use of human sources, cyber-intrusion, and outright theft across a countless number of industries.